Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(container): update image ghcr.io/siderolabs/installer ( v1.9.1 → v1.9.2 ) #5003

Merged
merged 1 commit into from
Jan 16, 2025

Conversation

repo-jeeves[bot]
Copy link
Contributor

@repo-jeeves repo-jeeves bot commented Jan 16, 2025

This PR contains the following updates:

Package Update Change
ghcr.io/siderolabs/installer patch v1.9.1 -> v1.9.2

Release Notes

siderolabs/talos (ghcr.io/siderolabs/installer)

v1.9.2

Compare Source

Talos 1.9.2 (2025-01-16)

Welcome to the v1.9.2 release of Talos!

Please try out the release binaries and report any issues at
https://github.com/siderolabs/talos/issues.

auditd

Kernel parameter talos.auditd.disabled=1 can be used to disable Talos built-in auditd service.

kube-apiserver Authorization Config

When using .cluster.apiServer.authorizationConfig the user provided order for the authorizers is honoured and Node and RBAC authorizers are always added to the end if not explicitly specified.

Eg: If user provides only Webhook authorizer, the final order will be Webhook, Node, RBAC.

To provide a specific order for Node or RBAC explicitly, user can provide the authorizer in the order they want.

Eg:

cluster:
  apiServer:
    authorizationConfig:
      - type: Node
        name: Node
      - type: Webhook
        name: Webhook
        webhook:
          connectionInfo:
            type: InClusterConfig
        ...
      - type: RBAC
        name: rbac

Usage of authorization-mode CLI argument will not support this form of customization.

Component Updates
  • Linux: 6.12.9
  • runc: 1.2.4
  • containerd: 2.0.2

Talos is built with Go 1.23.4.

Contributors
  • Andrey Smirnov
  • Dmitry Sharshakov
  • L.J. Hanson
  • Noel Georgi
  • Skyler Mäntysaari
  • TomyLobo
Changes
18 commits

Changes from siderolabs/pkgs
6 commits

Dependency Changes
  • github.com/siderolabs/go-blockdevice/v2 v2.0.9 -> v2.0.11
  • github.com/siderolabs/pkgs v1.9.0-15-g45c4ba4 -> v1.9.0-21-gc1f06e5
  • github.com/siderolabs/talos/pkg/machinery v1.9.1 -> v1.9.2

Previous release can be found at v1.9.1

Images
ghcr.io/siderolabs/flannel:v0.26.1
registry.k8s.io/coredns/coredns:v1.12.0
gcr.io/etcd-development/etcd:v3.5.17
registry.k8s.io/kube-apiserver:v1.32.0
registry.k8s.io/kube-controller-manager:v1.32.0
registry.k8s.io/kube-scheduler:v1.32.0
registry.k8s.io/kube-proxy:v1.32.0
ghcr.io/siderolabs/kubelet:v1.32.0
ghcr.io/siderolabs/installer:v1.9.2
registry.k8s.io/pause:3.10

…v1.9.2 )

| datasource | package                      | from   | to     |
| ---------- | ---------------------------- | ------ | ------ |
| docker     | ghcr.io/siderolabs/installer | v1.9.1 | v1.9.2 |
@repo-jeeves repo-jeeves bot added renovate/container Issue relates to a Renovate container update type/patch Issue relates to a patch version bump cluster/main Changes made in the main cluster size/XS Marks a PR that changes 0-9 lines, ignoring generated files labels Jan 16, 2025
@repo-jeeves
Copy link
Contributor Author

repo-jeeves bot commented Jan 16, 2025

--- kubernetes/main/apps/system-upgrade/system-upgrade-controller/plans Kustomization: flux-system/system-upgrade-controller-plans Plan: system-upgrade/kubernetes

+++ kubernetes/main/apps/system-upgrade/system-upgrade-controller/plans Kustomization: flux-system/system-upgrade-controller-plans Plan: system-upgrade/kubernetes

@@ -30,13 +30,13 @@

     - --server=false
     envs:
     - name: NODE_IP
       valueFrom:
         fieldRef:
           fieldPath: status.hostIP
-    image: ghcr.io/siderolabs/talosctl:v1.9.1
+    image: ghcr.io/siderolabs/talosctl:v1.9.2
   secrets:
   - ignoreUpdates: true
     name: talos
     path: /var/run/secrets/talos.dev
   serviceAccountName: system-upgrade
   tolerations:
@@ -52,9 +52,9 @@

     - --to=$(SYSTEM_UPGRADE_PLAN_LATEST_VERSION)
     envs:
     - name: NODE_IP
       valueFrom:
         fieldRef:
           fieldPath: status.hostIP
-    image: ghcr.io/siderolabs/talosctl:v1.9.1
+    image: ghcr.io/siderolabs/talosctl:v1.9.2
   version: v1.32.1
 
--- kubernetes/main/apps/system-upgrade/system-upgrade-controller/plans Kustomization: flux-system/system-upgrade-controller-plans Plan: system-upgrade/talos

+++ kubernetes/main/apps/system-upgrade/system-upgrade-controller/plans Kustomization: flux-system/system-upgrade-controller-plans Plan: system-upgrade/talos

@@ -17,24 +17,24 @@

       operator: In
       values:
       - talos
     - key: feature.node.kubernetes.io/system-os_release.VERSION_ID
       operator: NotIn
       values:
-      - v1.9.1
+      - v1.9.2
   prepare:
     args:
     - --nodes=$(NODE_IP)
     - health
     - --server=false
     envs:
     - name: NODE_IP
       valueFrom:
         fieldRef:
           fieldPath: status.hostIP
-    image: ghcr.io/siderolabs/talosctl:v1.9.1
+    image: ghcr.io/siderolabs/talosctl:v1.9.2
   secrets:
   - ignoreUpdates: true
     name: talos
     path: /var/run/secrets/talos.dev
   serviceAccountName: system-upgrade
   tolerations:
@@ -53,9 +53,9 @@

     - --wait=false
     envs:
     - name: NODE_IP
       valueFrom:
         fieldRef:
           fieldPath: status.hostIP
-    image: ghcr.io/siderolabs/talosctl:v1.9.1
-  version: v1.9.1
+    image: ghcr.io/siderolabs/talosctl:v1.9.2
+  version: v1.9.2
 
--- kubernetes/main/apps Kustomization: flux-system/cluster-apps Kustomization: flux-system/system-upgrade-controller-plans

+++ kubernetes/main/apps Kustomization: flux-system/cluster-apps Kustomization: flux-system/system-upgrade-controller-plans

@@ -19,13 +19,13 @@

   - name: system-upgrade-controller
   interval: 30m
   path: ./kubernetes/main/apps/system-upgrade/system-upgrade-controller/plans
   postBuild:
     substitute:
       KUBERNETES_VERSION: v1.32.1
-      TALOS_VERSION: v1.9.1
+      TALOS_VERSION: v1.9.2
     substituteFrom:
     - kind: ConfigMap
       name: cluster-settings
       optional: true
     - kind: Secret
       name: cluster-secrets

@repo-jeeves
Copy link
Contributor Author

repo-jeeves bot commented Jan 16, 2025

🦙 MegaLinter status: ✅ SUCCESS

Descriptor Linter Files Fixed Errors Elapsed time
✅ COPYPASTE jscpd yes no 1.07s
✅ REPOSITORY git_diff yes no 0.06s
✅ REPOSITORY secretlint yes no 3.04s
✅ YAML prettier 2 0 0.48s
✅ YAML yamllint 2 0 0.4s

See detailed report in MegaLinter reports
Set VALIDATE_ALL_CODEBASE: true in mega-linter.yml to validate all sources, not only the diff

MegaLinter is graciously provided by OX Security

@szinn szinn merged commit 90a827e into main Jan 16, 2025
16 checks passed
@szinn szinn deleted the renovate/main-ghcr.io-siderolabs-installer-1.x branch January 16, 2025 19:06
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
cluster/main Changes made in the main cluster renovate/container Issue relates to a Renovate container update size/XS Marks a PR that changes 0-9 lines, ignoring generated files type/patch Issue relates to a patch version bump
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant